CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-55417

Medium Severity
SVRS
36/100

CVSSv3
NA/10

EPSS
0.01821/1

CVE-2024-55417 is a critical file upload vulnerability in DevDojo Voyager, potentially allowing for arbitrary code execution. This flaw permits authenticated users to bypass file type verification when uploading files through the /admin/media/upload interface, enabling the upload of malicious web shells. Despite a low SVRS score of 36, indicating potentially less immediate risk compared to higher-scoring vulnerabilities, the ability to upload web shells is inherently dangerous. A successful exploit could allow attackers to gain complete control of the server. While the CVSS score is 0, the SVRS score provides a more holistic perspective of the real-world risks, including exploitability. Although the SVRS is relatively low in this case, remediation should be scheduled due to the significant impact of successful code execution.

In The Wild
2025-01-30

2025-02-06
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-55417 affects DevDojo Voyager versions up to 1.8.0 and allows an authenticated user to bypass file type verification when uploading files. This vulnerability could lead to arbitrary code execution on the server if an attacker uploads a malicious web shell disguised as a legitimate file.

While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 40, indicating a moderate risk. This is further amplified by the "In The Wild" tag, meaning that attackers are actively exploiting this vulnerability.

Key Insights

  • Authenticated User Exploitation: This vulnerability requires an authenticated user to exploit it. This means that an attacker needs valid credentials to gain access to the platform and exploit the vulnerability.
  • File Upload Mechanism: The vulnerability lies in the file upload functionality of the /admin/media/upload endpoint. An attacker can bypass the file type verification mechanism by uploading a web shell disguised as a legitimate file, leading to arbitrary code execution on the server.
  • Potential Impact: Exploiting this vulnerability could grant an attacker full control over the server. This could involve stealing sensitive data, installing malware, or disrupting normal operations.
  • Active Exploitation: The "In The Wild" tag indicates that attackers are actively exploiting this vulnerability in real-world scenarios. This necessitates immediate action to mitigate the risk.

Mitigation Strategies

  • Upgrade to the latest Version: The most effective way to mitigate this vulnerability is to upgrade DevDojo Voyager to a version that addresses the vulnerability.
  • Disable File Upload Functionality: If upgrading is not immediately possible, consider temporarily disabling the file upload functionality in the /admin/media/upload endpoint to prevent attackers from exploiting the vulnerability.
  • Implement Strict File Type Validation: Implement robust file type validation mechanisms to prevent attackers from uploading malicious files disguised as legitimate ones.
  • Regular Security Audits: Perform regular security audits to identify and address potential vulnerabilities within your systems, including file upload functionality.

Additional Information

If you have further questions or need more information regarding this specific incident, you can use the "Ask to Analyst" feature, contact SOCRadar directly, or open a support ticket.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February]
Ajit Jasrotia2025-02-03
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February] | This week, our news radar shows that every new tech idea comes with its own challenges. A hot AI tool is under close watch, law enforcement is shutting down online spots that help cybercriminals, and teams are busy fixing software bugs that could let attackers in. From better locks on our devices to stopping sneaky […] The post ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February] appeared
allhackernews.com
rss
forum
news
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February] - The Hacker News
2025-02-03
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February] - The Hacker News | News Content: This week, our news radar shows that every new tech idea comes with its own challenges. A hot AI tool is under close watch, law enforcement is shutting down online spots that help cybercriminals, and teams are busy fixing software bugs that could let attackers in. From better locks on our devices to stopping sneaky tricks online, simple steps are making a big difference. Let's take a closer look at how these efforts are shaping a safer digital world. ⚡ Threat of the Week
google.com
rss
forum
news
CVE-2024-55417 | DevDojo Voyager up to 1.8.0 /admin/media/upload Remote Code Execution
vuldb.com2025-01-30
CVE-2024-55417 | DevDojo Voyager up to 1.8.0 /admin/media/upload Remote Code Execution | A vulnerability was found in DevDojo Voyager up to 1.8.0. It has been classified as critical. This affects an unknown part of the file /admin/media/upload. The manipulation leads to Remote Code Execution. This vulnerability is uniquely identified as CVE-2024-55417. It is possible to initiate the attack remotely. There is no
vuldb.com
rss
forum
news
PHP package Voyager flaws expose to one-click RCE exploits
Pierluigi Paganini2025-01-30
PHP package Voyager flaws expose to one-click RCE exploits | The open-source PHP package Voyager is affected by three vulnerabilities that could be exploited to achieve one-click remote code execution on affected instances. Voyager is a popular open-source PHP package for managing Laravel applications, offering an admin interface, BREAD operations, media, and user management. During an ordinary scan activity, SonarSource researchers reported an arbitrary file write vulnerability in […] The open-source
securityaffairs.co
rss
forum
news

Social Media

Two of the vulnerabilities are tracked as CVE-2024-55417 and CVE-2024-55416, and when exploited, allows an attacker to remotely execute code
1
0
0
CVE-2024-55417: One-Click RCE Vulnerability in Voyager Admin Panel, No Patch Critical vulnerabilities discovered in Voyager, an open-source #Laravel admin panel. Learn about the CVE-2024-55417 flaws and their impact on website security. https://t.co/RCslmyJeZ4
0
0
1
🗣 CVE-2024-55417: One-Click RCE Vulnerability in Voyager Admin Panel, No Patch https://t.co/jqyiPZpif3
0
0
0
Laravel admin package Voyager vulnerable to one-click RCE flaw: https://t.co/jHHbFb68Dy Three vulnerabilities in the Laravel admin package Voyager could lead to remote code execution (RCE) attacks. CVE-2024-55417 allows file uploads bypassing MIME verification, CVE-2024-55416
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/thedevdojo/voyager/blob/1.6/src/Http/Controllers/VoyagerMediaController.php#L238
[email protected]https://www.sonarsource.com/blog/the-tainted-voyage-uncovering-voyagers-vulnerabilities/

CWE Details

CWE IDCWE NameDescription
CWE-434Unrestricted Upload of File with Dangerous TypeThe software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence